【24h】

Key Recycling in Authentication

机译:身份验证中的密钥回收

获取原文
获取原文并翻译 | 示例
           

摘要

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still ( varepsilon ) -secure, if ( varepsilon ) -almost strongly universal (_2) hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this ( varepsilon ) . We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.
机译:在验证的开创性工作中,Wegman和Carter提出,要验证多条消息,只要使用一次性密码垫加密每个标签,就足以重用相同的哈希函数。他们认为,由于一次性垫是完全隐藏的,因此所使用的哈希函数对于对手仍然是完全未知的。由于他们的证明是不可组合的,因此我们使用可组合的安全框架对其进行重新审查。事实证明,上述论点是不够的:如果攻击者了解到损坏的消息是被接受还是被拒绝,则有关散列函数的信息就会泄漏,并且在有限的一轮回合之后就完全知道了。但是,我们证明此泄漏很小:如果使用(varepsilon)-几乎使用了通用(_2)哈希函数,则Wegman和Carter的协议仍然是(varepsilon)-安全的。这意味着与哈希函数选择相对应的秘密密钥可以在下一轮身份验证中重用,而不会出现任何其他错误(varepsilon)。我们还表明,如果播放器具有适度的同步形式,即接收方知道何时应接收消息,则可以将密钥回收用于任何任意任务,而不仅是新一轮的身份验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号